InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Iran’s Infy APT resurfaces with new malware activity after years of silence
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Iran’s Infy APT resurfaces with new malware activity after years of silence
Technology

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 22, 2025 6 Min Read
Share

Threat hunters have discovered new activity related to the Iranian threat actor known as Infi (aka Prince of Persia), about five years after the hacking group was observed targeting victims in Sweden, the Netherlands, and Turkey.

“The scale of Prince of Persia’s activities is more significant than we originally anticipated,” Tomer Barr, vice president of security research at SafeBreach, said in a technical breakdown shared with Hacker News. “This threat group remains active, relevant, and dangerous.”

According to a report published by Palo Alto Networks Unit 42 in May 2016, Infy is one of the oldest advanced persistent threat (APT) actors in existence, with early evidence of activity dating back to December 2004. The report was also written by Barr and researcher Simon Conant.

The group also attracts little attention and remains elusive, unlike other Iranian groups such as Charming Kitten, MuddyWater, and OilRig. The attacks launched by this group primarily utilize two types of malware. One is a downloader and the other is a victim profiler named Foudre, which runs a second stage implant called Tonnerre to extract data from high-value machines. Foudre is known to be distributed through phishing emails.

SafeBreach’s latest findings reveal a covert campaign using updated versions of Foudre (version 34) and Tonnerre (versions 12-18, 50) to target victims in Europe as well as Iran, Iraq, Turkey, India, and Canada. The latest version of Tonnerre was detected in September 2025.

Attack chains have also seen a shift from Microsoft Excel files containing macros to embedding executable files within such documents to install Foudre. Perhaps the most notable aspect of threat actors’ modus operandi is their use of domain generation algorithms (DGA) to increase the resiliency of command and control (C2) infrastructure.

See also  SonicWall fixes CVE-2025-40602 that is actively being exploited on SMA 100 appliances

Additionally, Foudre and Tonnerre artifacts are known to verify the authenticity of C2 domains by downloading RSA signature files. The malware then uses the public key to decrypt the file and compares it to the locally stored verification file.

SafeBreach’s analysis of the C2 infrastructure also revealed a directory named “key” used for C2 verification, as well as other folders storing communication logs and exfiltrated files.

“Every day, Foodle downloads a proprietary signature file encrypted with an RSA private key by the threat actor and uses RSA validation with an embedded public key to verify that this domain is an authorized domain,” Bar said. “The format of the request is:

‘https:///key/. say. ‘”

The C2 server also has a “Downloads” directory whose current purpose is unknown. It is suspected that it is used to download and upgrade new versions.

Meanwhile, the latest version of Tonnerre includes a mechanism to contact Telegram groups (named سرافراز, which means “proudly” in Persian) through a C2 server. This group has two members. A user with the handle “@ehsan8999100” and a Telegram bot “@ttestro1bot” that is believed to be used for issuing commands and collecting data.

Using messaging apps on C2 is not unusual, but what’s notable is that information about Telegram groups is stored in a file named “tga.adr” in a directory called “t” on the C2 server. Please note that the download of the “tga.adr” file can only be triggered for a specific list of victim GUIDs.

Other older variants used in the Foudre campaign from 2017 to 2020 were also discovered by cybersecurity firms.

  • A version of Foudre disguised as Amaq News Finder to download and run malware
  • New version of trojan called MaxPinner downloaded by Foudre version 24 DLL to spy on Telegram content
  • A malware variant called Deep Freeze, similar to Amaq News Finder, is used to infect victims with Foudre.
  • Unknown malware called Rugissement

“Despite what appeared to be a dark turn in 2022, Prince of Persia threat actors did just the opposite,” Safebreach said. “Our continued investigative efforts against this prolific and elusive group have uncovered important details about their activities over the past three years, their C2 servers, and the malware variants they have identified.”

See also  A Cybercrime Merger Like No Other — Scattered Spider, LAPSUS$, and ShinyHunters Team Up

The disclosure comes as DomainTools’ continued analysis of the Charming Kitten leak sheds light on a broader picture of a hacker group operating like a government department while carrying out “clerical precision espionage.” It has also been revealed that this threat actor is behind the Moses Staff persona.

“APT 35, the same administrative machine running Tehran’s long-running credential phishing campaign, also ran the logistics of running Moses Staff’s ransomware theater,” the company said.

“Alleged hacktivists and government cyber forces share not only tools and targets, but also the same accounts payable system. The propaganda and espionage departments are two products of a single workflow, different ‘projects’ under the same internal ticketing system. ”

Share This Article
Twitter Copy Link
Previous Article The terrifyingly awesome Resident Evil remake trilogy is currently at its lowest price, so grab it now. The terrifyingly awesome Resident Evil remake trilogy is currently at its lowest price, so grab it now.
Next Article President Trump gives lumps of coal to governors of California and others focused on Christmas wishes President Trump gives lumps of coal to governors of California and others focused on Christmas wishes

You Might Also Like

New bug in Oracle E-Business Suite could allow hackers to access data without logging in
Technology

New bug in Oracle E-Business Suite could allow hackers to access data without logging in

2 Min Read
Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack
Technology

Axios Abuse and Salty2FA Kit Fuel Advanced Microsoft 365 Fishing Attack

7 Min Read
Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation
Technology

Grafana patch CVSS 10.0 SCIM flaw allows impersonation and privilege escalation

2 Min Read
Malware Delivery Channels
Technology

North Korean hackers turn JSON service into covert malware delivery channel

3 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?